Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

34 total results found

Wichtige Links

Elite Dangerous Einstieg

Apps und Webseiten EDDB - Elite Dangerous Database EDSM - Elite Dangerous StarMap Inara.cz - News & Datenbank Coriolis.io - Outfitting Calculator Edsy - Outfitting Calculator EDDI - Datenbrücke zur Übermittlung von Daten an das EDDN EDDN - Statusseite des EDDN...

Schamane

World of Warcraft Klassen

Guides Icy Veins Easymode Enhancement SchamaneRestoration SchamaneElemental Schamane

Meine Addons

World of Warcraft AddOns

Eine Liste mit meinen Addons

Obsolete Addons

World of Warcraft AddOns

Addons die leider obsolet sind und für die ich noch keinen guten Ersatz gefunden habe

Adventskalender

Projekte

Download auf meinem DL-Server vormals auch aus dem Play-Store Code abgelegt in meinem Git (derzeit closed source)

ProjectLifer

Projekte

Download auf meinem DL-Server Code abgelegt in meinem Git

TRV

Heimautomatisierung Zigbee

TuYa TV02 (_TZE200_hue3yfsn) Probleme: Temperatur wird nicht regelmäßig übertragen. Siehe dazu bspw. zigbee2mqtt#3142Dies führt dazu, dass die Automatisierung mit Better Thermostat nicht zuverlässig funktionieren kann. Keine Angabe zur Öffnungsposition B...

Krieger

World of Warcraft Klassen

Guides Icy Veins Easymode Arms KriegerFury KriegerProtection Krieger

DNS

Exploitation Links

https://nip.io/ Wildcard DNS

Request Interception

Exploitation Links

Tools: BurpSuite Links: Requestbin: Interecepts HTTP Requests (useful for blind SSRF)

HTTPD

Exploitation Links

Busybox HTTPD httpd [-ifv[v]] [-c CONFFILE] [-p [IP:]PORT] [-u USER[:GRP]] [-r REALM] [-h HOME] or httpd -d/-e/-m STRING Listen for incoming HTTP requests Options: -i Inetd mode -f Do not daemonize ...

File Inclusion

Remediation PHP

Basic Rules Keep system and services, including web application frameworks, updated with the latest version. Turn off PHP errors to avoid leaking the path of the application and other potentially revealing information. A Web Application Firewall (WAF) is ...

Conversion

Exploitation Links

CyberChef: Encode/Decode string formats with recipes

RCE

Privilege Escalation Links

Reverse Shell Generator: Generate reverse shells and listeners Reverse Shell Cheat Sheet: Some reverse shells by pentestmonkey

OWASP

Post-exploitation Links

OWASP Top10 OWASP Cheatsheets

OSSTMM

Fundamentals Methodologies

The Open Source Security Testing Methodology Manual provides a detailed framework of testing strategies for systems, software, applications, communications and the human aspect of cybersecurity. The methodology focuses primarily on how these systems, applicat...

OWASP

Fundamentals Methodologies

The "Open Web Application Security Project" framework is a community-driven and frequently updated framework used solely to test the security of web applications and services. The foundation regularly writes reports stating the top ten security vulnerabilit...

NIST Cybersecurity Framework 1.1

Fundamentals Methodologies

The NIST Cybersecurity Framework is a popular framework used to improve an organisations cybersecurity standards and manage the risk of cyber threats. This framework is a bit of an honourable mention because of its popularity and detail. The framework provi...